1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
7

Suppose 8 people want to communicate with each other using public key encryption. The communication between any pair of them is

visible to all of them but no other person other than the pair should be able to decode their communication. How many public and private keys are required for this group?
Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
5 0

Answer:

The answer is "64"

Explanation:

There has been 1 Private Key 1 Public Key for every person. The private key is used for other app messages. All else uses the Public Key to encrypt messages with that user. Those keys are numerically related. Even if you have 5 users, you will be given 5 Personal keys and 5 Public keys.

  • All user will have a duplicate of other public keys, which indicates (n*n-1) copies of n public keys on different systems to make sure shared contact between all users, plus n private keys.
  • The unique key count is 2n, with n^2 distributed private and public keys on different systems.
  • 8 people,  where 8 is a number, that is equal to n so, n^2 = 8^2 =8 \times 8 = 64
You might be interested in
What is the best resource to learn python?
7nadin3 [17]

Answer:

prolly a snake expert

Explanation:

they know snakes

4 0
2 years ago
Read 2 more answers
Dynamic addressing: __________.
Anarel [89]

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

6 0
3 years ago
Read 2 more answers
write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
chubhunter [2.5K]

Answer:un spain please

Explanation:

4 0
3 years ago
What are the three parts of a camera
son4ous [18]

Answer: Camera lens, Film or sensors, and body.

Explanation: I researched it.

8 0
2 years ago
What is a characteristic ofa good cloud-based hosting?
Aliun [14]

Answer:

Explanation:

A good cloud-based hosting has many beneficial characteristics, some of which include on-demand self-service, broad network access, and being very elastic and scalable. These characteristics allow for a large number of users to benefit from the service at any time of the day and at a very fast speed due to the broad network access.

6 0
3 years ago
Other questions:
  • Data is: a. Information endowed with relevance and purpose b. Set of specific objective facts or observations c. Some informatio
    10·1 answer
  • 2a
    8·1 answer
  • When the Squirrel peer-to-peer web caching service was evaluated by simulation, 4.11 hops were required on average to route a re
    11·1 answer
  • A _____ refers to a product or service, such as a technical report, a training session, a piece of hardware, or a segment of sof
    12·2 answers
  • when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
    14·1 answer
  • What is the missing line of code?
    10·2 answers
  • Pride Group of Companies is making tremendous profits in different categories of electronic goods. The group of managers have to
    12·1 answer
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • ________________, _______________ and ___________ are what you see when you open Excel
    15·1 answer
  • There are some games that cannot be described by a single--or even two-- genres. Can you think of any that should be invented?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!